Page 44 of 229 results (0.021 seconds)

CVSS: 2.6EPSS: 3%CPEs: 23EXPL: 0

The org.jboss.remoting.transport.bisocket.BisocketServerInvoker$SecondaryServerSocketThread.run method in JBoss Remoting 2.2.x before 2.2.3.SP4 and 2.5.x before 2.5.3.SP2 in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 through 4.3.0.CP09, and 5.1.0; and JBoss Enterprise Web Platform (aka JBEWP) 5.1.0; allows remote attackers to cause a denial of service (daemon outage) by establishing a bisocket control connection TCP session, and then not sending any application data. El método org.jboss.remoting.transport.bisocket.BisocketServerInvoker$SecondaryServerSocketThread.run en JBoss Remoting 2.2.x anteriores a 2.2.3.SP4 y 2.5.x anteriores a 2.5.3.SP2 de la plataforma de aplicaciones Red Hat JBoss Enterprise (JBoss EAP o JBEAP) 4.3 hasta la 4.3.0.CP09 y 5.1.0; y plataforma web JBoss Enterprise (JBEWP) 5.1.0; permite a atacantes remotos provocar una denegación de servicio (caída del demonio) estableciendo una sesión TCP de conexión de control bisocket, y a continuación no enviando ningún dato de aplicación. • http://securitytracker.com/id?1024813 http://www.redhat.com/support/errata/RHSA-2010-0937.html http://www.redhat.com/support/errata/RHSA-2010-0938.html http://www.redhat.com/support/errata/RHSA-2010-0939.html http://www.redhat.com/support/errata/RHSA-2010-0959.html http://www.redhat.com/support/errata/RHSA-2010-0960.html http://www.redhat.com/support/errata/RHSA-2010-0961.html http://www.redhat.com/support/errata/RHSA-2010-0962.html http://www.redhat.com/support/ • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 11%CPEs: 21EXPL: 0

The serialization implementation in JBoss Drools in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 before 4.3.0.CP09 and JBoss Enterprise SOA Platform 4.2 and 4.3 supports the embedding of class files, which allows remote attackers to execute arbitrary code via a crafted static initializer. La implementación de la serialización de JBoss Drools en la plataforma de aplicaciones Red Hat JBoss Enterprise (JBoss EAP o JBEAP) 4.3 anteriores a 4.3.0.CP09 y JBoss Enterprise SOA Platform 4.2 y 4.3 soporta ficheros de clases embebidos, lo que permite a atacantes remotos ejecutar código de su elección a través de un inicializador estático modificado. • http://securitytracker.com/id?1024813 http://www.redhat.com/support/errata/RHSA-2010-0937.html http://www.redhat.com/support/errata/RHSA-2010-0938.html http://www.redhat.com/support/errata/RHSA-2010-0939.html http://www.redhat.com/support/errata/RHSA-2010-0940.html https://bugzilla.redhat.com/show_bug.cgi?id=633859 https://issues.jboss.org/browse/SOA-2319 https://access.redhat.com/security/cve/CVE-2010-3708 • CWE-20: Improper Input Validation CWE-502: Deserialization of Untrusted Data •

CVSS: 2.6EPSS: 2%CPEs: 23EXPL: 0

The org.jboss.remoting.transport.bisocket.BisocketServerInvoker$SecondaryServerSocketThread.run method in JBoss Remoting 2.2.x before 2.2.3.SP4 and 2.5.x before 2.5.3.SP2 in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 through 4.3.0.CP09 allows remote attackers to cause a denial of service (daemon outage) by establishing a bisocket control connection TCP session, and then not sending any application data, related to a missing CVE-2010-3862 patch. NOTE: this can be considered a duplicate of CVE-2010-3862 because a missing patch should not be assigned a separate CVE identifier. El método org.jboss.remoting.transport.bisocket.BisocketServerInvoker$SecondaryServerSocketThread.run de JBoss Remoting 2.2.x anteriores a 2.2.3.SP4 y 2.5.x anteriores a 2.5.3.SP2 de la plataforma de aplicaciones Red Hat JBoss Enterprise (JBoss EAP o JBEAP) 4.3 hasta la 4.3.0.CP09 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) estableciendo un sesión TCP de conexión de control bisocket, y no enviando ningún dato de aplicación. Vulnerabilidad relacionada con un parche olvidado de CVE-2010-3862. NOTA: puede ser considerada un duplicado del CVE-2010-3862 porque un parche olvidado no debería tener asignado un identificador CVE. • http://securitytracker.com/id?1024840 http://www.redhat.com/support/errata/RHSA-2010-0964.html http://www.redhat.com/support/errata/RHSA-2010-0965.html https://bugzilla.redhat.com/show_bug.cgi?id=660623 https://issues.jboss.org/browse/JBPAPP-5253 https://issues.jboss.org/browse/JBREM-1261 https://access.redhat.com/security/cve/CVE-2010-4265 •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Cross-site request forgery (CSRF) vulnerability in the JMX Console in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 before 4.3.0.CP09 allows remote attackers to hijack the authentication of administrators for requests that deploy WAR files. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en la consola JMX de plataforma de aplicaciones Red Hat JBoss (JBoss EAP o JBEAP) 4.3 anteriores a la 4.3.0.CP09. Permite a usuarios remotos secuestrar (hijack) la autenticación de administradores para peticiones que despliegan ficheros WAR. • http://securitytracker.com/id?1024813 http://www.redhat.com/support/errata/RHSA-2010-0937.html http://www.redhat.com/support/errata/RHSA-2010-0938.html http://www.redhat.com/support/errata/RHSA-2010-0939.html https://bugzilla.redhat.com/show_bug.cgi?id=604617 https://access.redhat.com/security/cve/CVE-2010-3878 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 96%CPEs: 6EXPL: 1

JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured. JBoss Seam 2 (jboss-seam2), como el usado en JBoss Enterprise Application Platform v4.3.0 para Red Hat Linux, no sanea adecuadamente las entradas de de la expresiones de Expression LanguageJBoss Expression Language (EL), lo que permite a atacantes remotos ejecutar código de su elección a través de URL manipuladas. NOTA: Solo se da esta vulnerabilidad cuando el Java Security Manager no está configurado adecuadamente. JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, allows attackers to perform remote code execution. • https://www.exploit-db.com/exploits/36653 http://archives.neohapsis.com/archives/bugtraq/2013-05/0117.html http://www.redhat.com/support/errata/RHSA-2010-0564.html http://www.securityfocus.com/bid/41994 http://www.securitytracker.com/id?1024253 http://www.vupen.com/english/advisories/2010/1929 https://bugzilla.redhat.com/show_bug.cgi?id=615956 https://exchange.xforce.ibmcloud.com/vulnerabilities/60794 https://security.netapp.com/advisory/ntap-20161017-0001 https://access.redhat. • CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •